Module 3 Flashcards

1
Q

What word is used today to refer to network-connected hardware devices?

Device
Host
Endpoint
Client

A

Endpoint

Devices connected to a network today are far more than computing devices with a keyboard and monitor. Instead, devices ranging from mobile smartphones and tablets to wearable fitness trackers, industrial control system sensors, automotive telematics units, and even personal drones are all network-connected hardware devices. The word endpoint has become an accurate description of today’s end-user technology devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following attacks is based on a website accepting user input without sanitizing it?

XSS
SSXRS
SQLS
RSS

A

In a cross-site scripting (XSS) attack, a website that accepts user input without validating it (called sanitizing) and uses that input in a response can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which statement regarding a keylogger is NOT true?

-Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

  • Software keyloggers are generally easy to detect.
  • Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port.
  • Keyloggers can be used to capture passwords, credit card numbers, or personal information.
A

Software keyloggers are difficult to detect because a type of rootkit is used to conceal their presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is technology that imitates human abilities?
XLS
ML
AI
RC

A

Artificial intelligence (AI) at its core may be defined as technology that imitates human abilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following manipulates the trusting relationship between web servers?

CSRF
EXMAL
SSRF
SCSI

A

A server-side request forgery (SSRF) takes advantage of a trusting relationship between web servers. SSRF attacks exploit how a web server processes external information received from another server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Juan, a cybersecurity expert, has been hired by an organization whose networks have been compromised by a malware attack. After analyzing the network systems, Juan submits a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files.

Which malware attack is Juan reporting?

RAT
Spyware
Cryptomalware
Virus

A

Split infection technique is characteristic of a type of virus that lodges malicious codes in multiple locations within the file. It is normally placed randomly in various parts of the infected file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ransomware do to an endpoint device?

  • Ransomware attacks the endpoint device without the consent of the user or the device, discreetly collecting and transmitting information, causing harm to the end user.
  • Ransomware attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded.
  • Ransomware gets accidentally installed in the endpoint device as software along with other programs during the installation process. This happens when the user’s installation and download options are overlooked, thus affecting the user application adversely.
  • Ransomware infects the endpoint devices and launches attacks on the infected endpoint and other devices connected to the network.
A

-Ransomware attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded.
“Ransomware is an imprison malware that takes control of the endpoint device, affecting the device’s performance until the user pays a ransom to the attacker.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smitha, an employee working in the accounts department, reported to the information security officer that she could not access her computer. James, the security officer, noticed the following on Smitha’s system:

On booting the computer, the following message was flashing on the computer screen with the IRS logo:

“This computer is locked by the Internal Revenue Service. It has come to our attention that you are transferring funds to other agencies using this computer without compliance with the local income tax laws. As per section 22 of the U.S. Income Tax Act, the transmission of funds without applicable taxes is prohibited. Your IP address is identified in this fraudulent transaction and is locked to prevent further unlawful activities. This offense attracts a penalty of $400.00 for the first offense. You are hereby given 16 hours to resolve this issue, failing which you shall be prosecuted to the full extent of the law. You may make a secure payment by clicking on the following link. If you face any issues, you may reach out to us at compliance@irs.gov.us.”

The message will not close, nor is there access to applications or files on the computer; however, James can open shared files and folders on Smitha’s computer through the network.

What is your inference about the problem faced by Smitha on her computer?

Smitha’s computer is compromised by cryptomalware.
Smitha’s computer is compromised by spyware.
Smitha’s computer is compromised by ransomware.
Smitha’s computer is compromised by a PUP.

A

Ransomware pretends to block the computer, giving a seemingly valid reason and instructing the user to pay a fine before being allowed to use the device. James’s observations of Smitha’s computer shows it is most likely compromised by a ransomware attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a feature of a fileless virus?

Fileless viruses grant limited control.
Fileless viruses are easy to defend.
Fileless viruses are persistent.
Fileless viruses are easy to detect.

A

Fileless viruses grant limited control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zeda Corporation provides online training solutions to global customers. To provide e-learning solutions, it integrates with multiple vendor platforms. This ensures seamless transfer to multiple operators’ solutions through sign on. Joe, an IT security administrator, noticed that a threat actor has attacked the platform and stolen the user data. The source of this vulnerability was identified as one of the integrated external applications.

What type of attack is this?

This is an API attack.
This is a backdoor attack.
This is an AI attack.
This is a device driver manipulation attack.

A

The integration of a vendor platform with the Zeda platform for single-sign through API integration has caused the attack. One of the vendors has exposed the vulnerability through improper API integration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Japan’s cybercrime control center noticed that around 200,000 Tokyo computers are infected by bots, and all these bots are remotely controlled by a single attacker. What is this attacker referred to as?

Zombie
Botnet
Payload
Bot herder

A

A bot herder is the administrator or controller of the logical network of all devices infected by the attacker-created bots. In most cases, the device user is unaware of the bot herder’s influence on the endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a form of malware attack that uses specialized communication protocols?

Keylogger
Spyware
RAT
Bot

A

RAT has the functionality of a Trojan while also using specialized communication protocols that allow unauthorized access to the entire infected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user?

Trojan
Buffer overflow
Replay
Device driver manipulation

A

A replay attack copies data transmitted by the computer’s user and then uses it for an attack. Replay attacks are commonly used against digital identities. After intercepting and copying the data, the threat actor later retransmits selected and edited portions of the copied communications to impersonate the legitimate user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the database have been found modified. This was due to improper validation in the input fields exploited by the attacker.
What is the probable attack in the above scenario?

XML Injection
XSS
SQL Injection
SSRF

A

Attacks that introduce new input to exploit a vulnerability are called injections. One of the most common injection attacks is an SQL injection, which inserts statements that manipulate a database server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kate decides to download an extension to her favorite browser to quickly store links on her spreadsheet software. While downloading the software, she ignores the opt-out check box that allows the extension to download a search toolbar.

What has occurred here?

Kate has installed a Trojan.
Kate has installed an injection.
Kate has installed a backdoor.
Kate has installed a potentially unwanted program (PUP).

A

Kate has installed a potentially unwanted program (PUP).

An additional program was installed along with the program Katie intended to install because she overlooked the opt-out check box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gabriel’s sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer?

a. Persistent lockware
b. Blocking ransomware
c. Cryptomalware
d. Impede-ware

A

b. Blocking ransomware

17
Q

Marius’s team leader has just texted him that an employee, who violated company policy by bringing in a file on her USB flash drive, has just reported that her computer is suddenly locked up with cryptomalware. Why would Marius consider this a dangerous situation?

a. It sets a precedent by encouraging other employees to violate company policy.
b. Cryptomalware can encrypt all files on any network that is connected to the employee’s computer.
c. The organization may be forced to pay up to $500 for the ransom.
d. The employee would have to wait at least an hour before her computer could be restored.

A

b. Cryptomalware can encrypt all files on any network that is connected to the employee’s computer.

18
Q

Which type of malware relies on LOLBins?

a. PUP
b. File-based virus
c. Fileless virus
d. Bot

A

c. Fileless virus

19
Q

Which of the following is known as a network virus?

a. TAR
b. Worm
c. Remote exploitation virus (REV)
d. C&C

A

b. Worm

20
Q

Josh is researching the different types of attacks that can be generated through a botnet. Which of the following would NOT be something distributed by a botnet?

a. LOLBins
b. Spam
c. Malware
d. Ad fraud

A

b. Spam

21
Q

Which of the following is NOT a means by which a bot communicates with a C&C device?

a. Signing in to a website the bot herder operates
b. Signing in to a third-party website
c. Email
d. Command sent through Twitter posts

A

a. Signing in to a website the bot herder operates

22
Q

Randall’s roommate is complaining to him about all of the software that came pre-installed on his new computer. He doesn’t want the software because it slows down the computer. What type of software is this?

a. Spyware
b. BOT
c. PUP
d. Keylogger

A

c. PUP

23
Q

What is the difference between a Trojan and a RAT?

a. There is no difference.
b. A RAT gives the attacker unauthorized remote access to the victim’s computer.
c. A Trojan can carry malware while a RAT cannot.
d. A RAT can infect only a smartphone and not a computer

A

b. A RAT gives the attacker unauthorized remote access to the victim’s computer.

24
Q

Which of these would NOT be considered the result of a logic bomb?

a. Send an email to Rowan’s inbox each Monday morning with the agenda of that week’s department meeting.
b. If the company’s stock price drops below $50, then credit Oscar’s retirement account with one additional year of retirement credit.
c. Erase the hard drives of all the servers 90 days after Alfredo’s name is removed from the list of current employees.
d. Delete all human resource records regarding Augustine one month after he leaves the company.

A

a. Send an email to Rowan’s inbox each Monday morning with the agenda of that week’s department meeting.

25
Q

Which of the following attacks is based on a website accepting user input without sanitizing it?

a. RSS
b. XSS
c. SQLS
d. SSXRS

A

b. XSS

26
Q

Which of the following attacks is based on the principle that when a user is currently authenticated on a website and then loads another webpage, the new page inherits the identity and privileges of the first website?

a. SSFR
b. DLLS
c. CSRF
d. DRCR

A

c. CSRF

27
Q

Which of the following manipulates the trusting relationship between web servers?

a. SSRF
b. CSRF
c. EXMAL
d. SCSI

A

a. SSRF

27
Q

Which type of memory vulnerability attack manipulates the “return address” of the memory location of a software program?

a. Shim overflow attack
b. Factor overflow attack
c. Integer overflow attack
d. Buffer overflow attack

A

d. Buffer overflow attack

28
Q

What race condition can result in a NULL pointer/ object dereference?

a. Conflict race condition
b. Value-based race condition
c. Thread race condition
d. Time of check/time of use race condition

A

d. Time of check/time of use race condition

29
Q

Which of the following attacks targets the external software component that is a repository of both code and data?

a. Application program interface (API) attack
b. Device driver manipulation attack
c. Dynamic-link library (DLL) injection attack
d. OS REG attack

A

c. Dynamic-link library (DLL) injection attack

30
Q

What term refers to changing the design of existing code?

a. Library manipulation
b. Shimming
c. Refactoring
d. Design driver manipulation

A

c. Refactoring

31
Q

Which of the following is technology that imitates human abilities?

a. AI
b. ML
c. RC
d. XLS

A

a. AI

32
Q

Which statement regarding a keylogger is NOT true?

a. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.
b. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port.
c. Software keyloggers are generally easy to detect.
d. Keyloggers can be used to capture passwords, credit card numbers, or personal information.

A

c. Software keyloggers are generally easy to detect.